big data management and security
play

Big Data Management and Security Audit Concerns and Business Risks - PowerPoint PPT Presentation

Big Data Management and Security Audit Concerns and Business Risks Tami Frankenfield Sr. Director, Analytics and Enterprise Data Mercury Insurance What is Big Data? Velocity + Volume + Variety = Value The Big Data Journey Big Data is


  1. Big Data Management and Security Audit Concerns and Business Risks Tami Frankenfield Sr. Director, Analytics and Enterprise Data Mercury Insurance

  2. What is Big Data? Velocity + Volume + Variety = Value

  3. The Big Data Journey Big Data is the next step in the evolution of analytics to answer critical and often highly complex business questions. However, that journey seldom starts with technology and requires a broad approach to realize the desired value. “Big Data” Leverage large volumes of multi-structured data for advanced data mining and predictive purposes “Fast Data” Analyze streams of real-time data, identify significant events, and alert other systems Modeling and Predicting Leverage information for forecasting and predictive purposes Business Intelligence Focus on what happened and more importantly, why it happened Reporting Report on standard business processes Data Management Establish initial processes and standards

  4. Implications of Big Data? Enterprises face the challenge and opportunity of storing and analyzing Big Data. • Handling more than 10 TB of data “Shift thinking from the “Enterprises can old world where data leverage the data • Data with a changing structure or no structure at all was scarce, to a world influx to glean new where business leaders insights – Big Data • Very high throughput systems: for example, in globally demonstrate data represents a largely popular websites with millions of concurrent users and fluency” - Forrester untapped source of thousands of queries per second customer, product, and market • Business requirements that differ from the relational intelligence” – IBM database model: for example, swapping ACID (Atomicity, CIO Study “Information governance Consistency, Isolation, Durability) for BASE (Basically focus needs to shift away Available, Soft State, Eventually Consistent) from more concrete, black and white issues • Processing of machine learning queries that are inefficient or centered on ‘truth’, impossible to express using SQL toward more fluid shades of gray centered on ‘trust.’ ” - Gartner

  5. Taking a Look at the Big Data Ecosystem Big Data Is supported and moved forward by a number of capabilities throughout the ecosystem. In many cases, vendors and resources play multiple roles and are continuing to evolve their technologies and talent to meet the changing market demands. Big Data BI/Data Analytics Visualization Big Data Appliances Integration Big Data File Stream and Database Processing Management and Analysis Big Data Ecosystem

  6. Big Data Storage and Management An Hadoop based solution is designed to leverage distributed storage and a parallel processing framework (MapReduce) for addressing the big data problem. Hadoop is an Apache foundation open source project. Apache Hadoop Ecosystem UI Framework SDK OOZIE PIG HIVE ( Workflow & Scheduling) (Data Flow) (SQL) ZOOKEEPER (Coordination) Integration) FLUME, SQOOP ( Data MapReduce (Job Scheduling and Processing Engine) Hadoop HBase (Distributed DB) HDFS ( Storage Layer) Connectors MPP or In-memory Traditional Data solutions Warehouse (DW) Advanced Analytics Traditional Tools Databases

  7. Big Data Storage and Management The need for Big Data storage and management has resulted in a wide array of solutions spanning from advanced relational databases to non-relational databases and file systems. The choice of the solution is primarily dictated by the use case and the underlying data type. Non-Relational Databases Relational Databases have been developed to are evolving to address address the need for semi- the need for structured structured and Big Data storage and unstructured data storage management. and management. Hadoop HDFS is a widely used key-value store designed for Big Data processing.

  8. Big Data Security Scope Big Data security should address four main requirements – perimeter security and authentication, authorization and access, data protection, and audit and reporting. Centralized administration and coordinated enforcement of security policies should be considered. Applicability Across Environments Production Research Development Required for guarding access to the system , its    Kerberos data and services. Authentication makes sure the Perimeter Security & user is who he claims to be. Two levels of Authentication LDAP/ Active Directory and Authentication need to be in place – perimeter    BU Security Tool and intra-cluster. Integration** Required to manage access and control over File & Directory    Permissions, ACL data , resources and services. Authorization can Authorization & Access Big Data Security be enforced at varying levels of granularity and in    compliance with existing enterprise security Role Based Access Controls standards. Required to control unauthorized access to Encryption at Rest  sensitive data either while at rest or in motion. and in Motion Data Protection Data protection should be considered at field, file and network level and appropriate methods  Data Masking & Tokenization should be adopted Required to maintain and report activity on the   Audit Data system. Auditing is necessary for managing Audit & Reporting security compliance and other requirements like   security forensics. Audit Reporting 8

  9. Big Data Security, Access, Control and Encryption Integration of Security, Access, Control and Encryption across major components of the Big Data landscape. Column Folder Table Folder Security/Access Control UI File  Ability to define roles Database File  Ability to add/remove users  Ability to assign roles to users  Ability to scale across platforms Table Database Column Table CF CF LDAP/ACTIVE Directory Restricted Access Encrypted Data

  10. Security, Access, Control and Encryption Details Guidelines & Considerations Encryption / Anonymization  Data should be natively encrypted during ingestion of data into Hadoop (regardless of the data getting loaded into HDFS/Hive/HBase)  Encryption Key management should be maintained at a Hadoop Admin level, there by the sanctity of the Encryption is maintained properly Levels of granularity in relation to data access and security  HDFS : Folder and File level access control  Hive : Table and Column level access control  HBase : Table and Column Family level access control Security implementation protocol  Security/Data Access controls should be maintained at the lowest level of details within a Hadoop cluster  Overhead of having Security/Data Access should be minimum on any CRUD operation Manageability / scalability  GUI to Create/Maintain Roles/Users etc. to enable security or data access for all areas of Hadoop  Ability to export/share the information held in the GUI across other applications/platforms  Same GUI interface or application should be able to scale across multiple platforms (Hadoop and Non-Hadoop) Key Terms Defined Point of View In Hadoop, Kerberos currently provides two aspects of security: Large organizations should adopt a more scalable solution with finer grains of access control and encryption / anonymization of  Authentication – This feature can be enabled by mapping the data UNIX level Kerberos IDs to that of Hadoop. In a mature Select a tool which is architecturally highly scalable and consists of environment, Kerberos is linked/mapped to Active Directory or the following features: LDAP system of an organization. Maintenance of mapping is  Levels of granularity in relation to data access and security typically complicated  Security implementation protocol  Authorization – Mapping done in the Authentication level is  Manageability / scalability leveraged by the Authorization and the users can be authorized  Encryption / Anonymization to access data at the HDFS folder level

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend